General

  • Target

    1492-83-0x00000000002C0000-0x00000000002F0000-memory.dmp

  • Size

    192KB

  • MD5

    2836e3de2e68aa51bbff789ec5381d5a

  • SHA1

    bae6cb36452ccfdaa6a78feadf6fc23d53a09899

  • SHA256

    c11e24470f7cc5a875b519ae22abce427eaec6252536b692cbca42c3f92c79c8

  • SHA512

    5590b119450ffdcfcb10de008eef9d76aa7ff1cb2a8c5dedaad44ad22d0197777b4ac46b9586bc3f603f03b7781fb5814e43c882a447fb59761bb4e8fb2890e5

  • SSDEEP

    3072:otE62xyQ6d+VeXdxNLgVK880EHD8e8hK:4EmOA9S80EHD

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

andre

C2

77.91.124.49:19073

Attributes
  • auth_value

    8e5522dc6bdb7e288797bc46c2687b12

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1492-83-0x00000000002C0000-0x00000000002F0000-memory.dmp
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections